http://arxiv.org/api/6lEsejqkKGnWSdcFky7S2A8fmoQ 2025-04-22T00:00:00-04:00 49781 75 15 http://arxiv.org/abs/2504.12102v1 2025-04-16T14:08:25Z 2025-04-16T14:08:25Z Successive-Cancellation Flip and Perturbation Decoder of Polar Codes In this paper, two decoding algorithms based on Successive Cancellation (SC) are proposed to improve the error-correction performance of cyclic redundancy check (CRC)-aided polar codes while aiming for a low-complexity implementation. Comparisons with Dynamic SC Flip (DSCF) and SC Perturbation (SCP) are carried out since the proposed DSCF and Perturbation (DSCFP) and Perturbed DSCF (PDSCF) algorithms combine both methods. The analysis includes comparisons with several code lengths $N$ and various number of decoding attempts $T_{max}$. For $N=1024$ and the coding rate $R=\frac{1}{2}$, the DSCFP and the SCP algorithms with $T_{max}=17$ are bested by approximately $0.1$\,dB at block error rate (BLER) of $0.001$. At $\text{BLER}=10^{-6}$ and for $T_{max}=64$, the gain is of $0.375$ dB and $>0.5$ dB with respect to DSCF and SCP, respectively. At high signal-to-noise ratio, the average computational complexity of the proposed algorithms is virtually equivalent to that of SC. Charles Pillet Ilshat Sagitov Dominic Deslandes Pascal Giard 6 pages, 9 figures, 1 table. Presented in IEEE WCNC 2025, Milan, Italy http://arxiv.org/abs/2504.12071v1 2025-04-16T13:26:30Z 2025-04-16T13:26:30Z Generalized Restart Mechanism for Successive-Cancellation Flip Decoding of Polar Codes Polar codes are a class of linear error-correction codes that have received a lot of attention due to their ability to achieve channel capacity in an arbitrary binary discrete memoryless channel (B-DMC) with low-complexity successive-cancellation (SC) decoding. However, practical implementations often require better error-correction performance than what SC decoding provides, particularly at short to moderate code lengths. Successive-cancellation flip (SCF) decoding algorithm was proposed to improve error-correction performance with an aim to detect and correct the first wrongly estimated bit in a codeword before resuming SC decoding. At each additional SC decoding trial, i.e., decoding attempt beyond the initial unsuccessful trial, one bit estimated as the least reliable is flipped. Dynamic SCF (DSCF) is a variation of SCF, where multiple bits may be flipped simultaneously per trial. Despite the improved error-correction performance compared to the SC decoder, SCF-based decoders have variable execution time, which leads to high average execution time and latency. In this work, we propose the generalized restart mechanism (GRM) that allows to skip decoding computations that are identical between the initial trial and any additional trial. Under DSCF decoding with up to 3-bit flips per decoding trial, our proposed GRM is shown to reduce the average execution time by 25% to 60% without any negative effect on error-correction performance. The proposed mechanism is adaptable to state-of-the-art latency-reduction techniques. When applied to Fast-DSCF-3 decoding, the additional reduction brought by the GRM is 15% to 22%. For the DSCF-3 decoder, the proposed mechanism requires approximately 4% additional memory. Ilshat Sagitov Charles Pillet Alexios Balatsoukas-Stimming Pascal Giard 10.1007/s11265-025-01949-8 Accepted in Journal of Signal Processing Systems, 21 pages, 8 figures, 6 tables http://arxiv.org/abs/2504.12009v1 2025-04-16T12:05:30Z 2025-04-16T12:05:30Z Network-Centric Countermeasures Against Integrated Sensing Enabled Jamming Adversaries Recent developments in Integrated Sensing and Communication have led to new adversarial models in wireless security through Integrated Sensing and Jamming (ISAJ) adversaries. ISAJ adversaries, owing to their sensing capabilities, are known to inject jamming energy over the victim's frequency band, and also use generalized energy measurements on various network frequencies to detect the presence of countermeasures. Existing countermeasures against such ISAJ adversaries are laid under the assumption that the adversary does not have the knowledge of the countermeasure. However, according to Kerchoffs' principle in cryptography, security of a countermeasure should only rely on the secret-keys, not on the obfuscation of the countermeasure. On testing the security of existing countermeasures, we observe that they violate Kerchoffs' principle, thus motivating the need for new countermeasures. In this regard, we propose a novel network-centric countermeasure against ISAJ adversaries, wherein a group of users in the network assist the victim to reliably communicate her messages in a covert manner. Firstly, we analyse the error performance of the proposed countermeasure, and study its behavior on the number of assisting users in the network. Subsequently, to validate its security against Kerchoffs' principle, we study the Shannon's entropy associated with the presence of the victim's messages in the network and analyse its behaviour as a function of the number of assisting users. Finally, to study the interplay between reliability and covertness, we pose interesting optimization problems and solve them to choose the underlying parameters of the countermeasure and the number of assisting users. Soumita Hazra J. Harshan 8 pages. To appear in the proceedings of WiOpt 2025 http://arxiv.org/abs/2504.09310v2 2025-04-16T11:25:54Z 2025-04-12T19:05:00Z Conformal Calibration: Ensuring the Reliability of Black-Box AI in Wireless Systems AI is poised to revolutionize telecommunication networks by boosting efficiency, automation, and decision-making. However, the black-box nature of most AI models introduces substantial risk, possibly deterring adoption by network operators. These risks are not addressed by the current prevailing deployment strategy, which typically follows a best-effort train-and-deploy paradigm. This paper reviews conformal calibration, a general framework that moves beyond the state of the art by adopting computationally lightweight, advanced statistical tools that offer formal reliability guarantees without requiring further training or fine-tuning. Conformal calibration encompasses pre-deployment calibration via uncertainty quantification or hyperparameter selection; online monitoring to detect and mitigate failures in real time; and counterfactual post-deployment performance analysis to address "what if" diagnostic questions after deployment. By weaving conformal calibration into the AI model lifecycle, network operators can establish confidence in black-box AI models as a dependable enabling technology for wireless systems. Osvaldo Simeone Sangwoo Park Matteo Zecchin submitted for a journal publication http://arxiv.org/abs/2504.11978v1 2025-04-16T11:17:41Z 2025-04-16T11:17:41Z On the Intersection and Composition properties of conditional independence Compositional graphoids are fundamental discrete structures which appear in probabilistic reasoning, particularly in the area of graphical models. They are semigraphoids which satisfy the Intersection and Composition properties. These important properties, however, are not enjoyed by general probability distributions. We survey what is known in terms of sufficient conditions for Intersection and Composition and derive a set of new sufficient conditions in the context of discrete random variables based on conditional information inequalities for Shannon entropies. Tobias Boege 12 pages; submitted to WUPES '25 http://arxiv.org/abs/2504.11960v1 2025-04-16T10:43:23Z 2025-04-16T10:43:23Z On Codes from Split Metacyclic Groups The paper presents a comprehensive study of group codes from non-abelian split metacyclic group algebras. We derive an explicit Wedderburn-like decomposition of finite split metacyclic group algebras over fields with characteristic coprime to the group order. Utilizing this decomposition, we develop a systematic theory of metacyclic codes, providing their algebraic description and proving that they can be viewed as generalized concatenated codes with cyclic inner codes and skew quasi-cyclic outer codes. We establish bounds on the minimum distance of metacyclic codes and investigate the class of induced codes. Furthermore, we show the feasibility of constructing a partial key-recovery attack against certain McEliece-type cryptosystems based on metacyclic codes by exploiting their generalized concatenated structure. Kirill Vedenev http://arxiv.org/abs/2410.00078v2 2025-04-16T10:42:51Z 2024-09-30T16:26:40Z Shuffled Linear Regression via Spectral Matching Shuffled linear regression (SLR) seeks to estimate latent features through a linear transformation, complicated by unknown permutations in the measurement dimensions. This problem extends traditional least-squares (LS) and Least Absolute Shrinkage and Selection Operator (LASSO) approaches by jointly estimating the permutation, resulting in shuffled LS and shuffled LASSO formulations. Existing methods, constrained by the combinatorial complexity of permutation recovery, often address small-scale cases with limited measurements. In contrast, we focus on large-scale SLR, particularly suited for environments with abundant measurement samples. We propose a spectral matching method that efficiently resolves permutations by aligning spectral components of the measurement and feature covariances. Rigorous theoretical analyses demonstrate that our method achieves accurate estimates in both shuffled LS and shuffled LASSO settings, given a sufficient number of samples. Furthermore, we extend our approach to address simultaneous pose and correspondence estimation in image registration tasks. Experiments on synthetic datasets and real-world image registration scenarios show that our method outperforms existing algorithms in both estimation accuracy and registration performance. Hang Liu Anna Scaglione This work has been submitted to the IEEE for possible publication http://arxiv.org/abs/2410.17754v3 2025-04-16T09:50:33Z 2024-10-23T10:31:34Z Puncturing Quantum Stabilizer Codes Classical coding theory contains several techniques to obtain new codes from other codes, including puncturing and shortening. For quantum codes, a form of puncturing is known, but its description is based on the code space rather than its generators. In this work, we generalize the puncturing procedure to allow more freedom in the choice of which coded states are kept and which are removed. We describe this puncturing by focusing on the stabilizer matrix containing the generators of the code. In this way, we are able to explicitly describe the stabilizer matrix of the punctured code given the stabilizer matrix of the original stabilizer code. The additional freedom in the procedure also opens up new ways to construct new codes from old, and we present several ways to utilize this for the search of codes with good or even optimal parameters. In particular, we use the construction to obtain codes whose parameters exceed the best previously known. Lastly, we generalize the proof of the Griesmer bound from the classical setting to stabilizer codes since the proof relies heavily on the puncturing technique. Jaron Skovsted Gundersen René Bødker Christensen Markus Grassl Petar Popovski Rafał Wisniewski Accepted version for IEEE Journal on Selected Areas in Information Theory http://arxiv.org/abs/2402.10504v4 2025-04-16T09:25:06Z 2024-02-16T08:27:55Z Resilience of Rademacher chaos of low degree The resilience of a Rademacher chaos is the maximum number of adversarial sign-flips that the chaos can sustain without having its largest atom probability significantly altered. Inspired by probabilistic lower-bound guarantees for the resilience of linear Rademacher chaos, obtained by Bandeira, Ferber, and Kwan (Advances in Mathematics, Vol. $319$, $2017$), we provide probabilistic lower-bound guarantees for the resilience of Rademacher chaos of arbitrary yet sufficiently low degree. Our main results distinguish between Rademacher chaos of order two and those of higher order. In that, our first main result pertains to the resilience of decoupled bilinear Rademacher forms where different asymptotic behaviour is observed for sparse and dense matrices. For our second main result, we bootstrap our first result in order to provide resilience guarantees for quadratic Rademacher chaos. Our third main result, generalises the first and handles the resilience of decoupled Rademacher chaos of arbitrary yet sufficiently low order. Our results for decoupled Rademacher chaos of order two and that of higher order whilst are established through the same conceptual framework, differ substantially. A difference incurred due to the implementation of the same conceptual argument. The order two result is established using Dudley's maximal inequality for sub-Gaussian processes, the Hanson-Wright inequality, as well as the Kolmogorov-Rogozin inequality. To handle higher order chaos, appeals to Dudley's inequality as well as the Hanson-Wright inequality are replaced with tools suited for random tensors. Appeals to the Hanson-Wright inequality are replaced with appeals to a concentration result for random tensors put forth by Adamczak and Wolff. Our results are instance-dependent and thus allow for the efficient computation of resilience guarantees provided the order of the chaos is constant. Elad Aigner-Horev Daniel Rosenberg Roi Weiss Small corrections from previous version http://arxiv.org/abs/2504.02376v2 2025-04-16T09:24:22Z 2025-04-03T08:10:25Z An Efficient Reservation Protocol for Medium Access: When Tree Splitting Meets Reinforcement Learning As an enhanced version of massive machine-type communication in 5G, massive communication has emerged as one of the six usage scenarios anticipated for 6G, owing to its potential in industrial internet-of-things and smart metering. Driven by the need for random multiple-access (RMA) in massive communication, as well as, next-generation Wi-Fi, medium access control has attracted considerable recent attention. Holding the promise of attaining bandwidth-efficient collision resolution, multiaccess reservation no doubt plays a central role in RMA, e.g., the distributed coordination function (DCF) in IEEE 802.11. In this paper, we are interested in maximizing the bandwidth efficiency of reservation protocols for RMA under quality-of-service constraints. Particularly, we present a tree splitting based reservation scheme, in which the attempting probability is dynamically optimized by partially observable Markov decision process or reinforcement learning (RL). The RL-empowered tree-splitting algorithm guarantees that all these terminals with backlogged packets at the beginning of a contention cycle can be scheduled, thereby providing a first-in-first-out service. More importantly, it substantially reduces the reservation bandwidth determined by the communication complexity of DCF, through judiciously conceived coding and interaction for exchanging information required by distributed ordering. Simulations demonstrate that the proposed algorithm outperforms the CSMA/CA based DCF in IEEE 802.11. Yutao Chen Wei Chen http://arxiv.org/abs/2410.03395v2 2025-04-16T08:50:18Z 2024-10-04T12:58:31Z Local Clustering and Global Spreading of Receptors for Optimal Spatial Gradient Sensing Spatial information from cell-surface receptors is crucial for processes that require signal processing and sensing of the environment. Here, we investigate the optimal placement of such receptors through a theoretical model that minimizes uncertainty in gradient estimation. Without requiring a priori knowledge of the physical limits of sensing or biochemical processes, we reproduce the emergence of clusters that closely resemble those observed in real cells. On perfect spherical surfaces, optimally placed receptors spread uniformly. When perturbations break their symmetry, receptors cluster in regions of high curvature, massively reducing estimation uncertainty. This agrees with mechanistic models that minimize elastic preference discrepancies between receptors and cell membranes. We further extend our model to motile receptors responding to cell-shape changes and external fluid flow, demonstrating the relevance of our model in realistic scenarios. Our findings provide a simple and utilitarian explanation for receptor clustering at high-curvature regions when high sensing accuracy is paramount. Albert Alonso Robert G. Endres Julius B. Kirkegaard 10.1103/PhysRevLett.134.158401 This version has been accepted for publication in Physical Review Letters. The final version is available at https://doi.org/10.1103/PhysRevLett.134.158401. Title has changed Phys. Rev. Lett. 134, 158401 (2025) http://arxiv.org/abs/2501.18308v2 2025-04-16T08:25:10Z 2025-01-30T12:35:21Z Zero Estimation Cost Strategy for Witsenhausen Counterexample with Causal Encoder We propose a zero estimation cost (ZEC) scheme for causal-encoding noncausal-decoding vector-valued Witsenhausen counterexample based on the coordination coding result. In contrast to source coding, our goal is to communicate a controlled system state. The introduced ZEC scheme is a joint control-communication approach that transforms the system state into a sequence that can be efficiently communicated using block coding. Numerical results show that our approach significantly reduces the power required for achieving zero-estimation-cost state reconstruction at the decoder. In the second part, we introduce a more general non-zero estimation cost (Non-ZEC) scheme. We observe numerically that the Non-ZEC scheme operates as a time-sharing mechanism between the two-point strategy and the ZEC scheme. Overall, by leveraging block-coding gain, our proposed methods substantially improve the power-estimation trade-off for Witsenhausen counterexample. Mengyuan Zhao Tobias J. Oechtering Maël Le Treust This file is provided with the complete derivation of Theorem IV.1 http://arxiv.org/abs/2209.13636v3 2025-04-16T08:23:43Z 2022-09-27T19:05:22Z Local Grammar-Based Coding Revisited In the setting of minimal local grammar-based coding, the input string is represented as a grammar with the minimal output length defined via simple symbol-by-symbol encoding. This paper discusses four contributions to this field. First, we invoke a simple harmonic bound on ranked probabilities, which reminds Zipf's law and simplifies universality proofs for minimal local grammar-based codes. Second, we refine known bounds on the vocabulary size, showing its partial power-law equivalence with mutual information and redundancy. These bounds are relevant for linking Zipf's law with the neural scaling law for large language models. Third, we develop a framework for universal codes with fixed infinite vocabularies, recasting universal coding as matching ranked patterns that are independent of empirical data. Finally, we analyze grammar-based codes with finite vocabularies being empirical rank lists, proving that that such codes are also universal. These results extend foundations of universal grammar-based coding and reaffirm previously stated connections to power laws for human language and language models. Łukasz Dębowski 41 pages, no figures http://arxiv.org/abs/2412.16579v2 2025-04-16T05:56:53Z 2024-12-21T10:56:17Z A generalisation of bent vectors for Butson Hadamard matrices An $n\times n$ complex matrix $M$ with entries in the $k^{\textrm{th}}$ roots of unity which satisfies $MM^{\ast} = nI_{n}$ is called a Butson Hadamard matrix. While a matrix with entries in the $k^{\textrm{th}}$ roots typically does not have an eigenvector with entries in the same set, such vectors and their generalisations turn out to have multiple applications. A bent vector for $M$ satisfies $M{\bf x} = \lambda {\bf y}$ where ${\bf x}$ has entries in the $k^{\textrm{th}}$ roots of unity and all entries of $\textbf{y}$ are complex numbers of norm $1$. Such a bent vector ${\bf x}$ is self-dual if ${\bf y} = \mu{\bf x}$ and conjugate self-dual if ${\bf y} = \mu\overline{\bf x}$ for some $\mu$ of norm $1$. Using techniques from algebraic number theory, we prove some order conditions and non-existence results for self-dual and conjugate self-dual bent vectors; using tensor constructions and Bush-type matrices we give explicit examples. We conclude with an application to the covering radius of certain non-linear codes generalising the Reed Muller codes. José Andrés Armario Ronan Egan Hadi Kharaghani Padraig Ó Catháin http://arxiv.org/abs/2504.11784v1 2025-04-16T05:36:52Z 2025-04-16T05:36:52Z DALC: Distributed Arithmetic Coding Aided by Linear Codes Distributed Arithmetic Coding (DAC) has emerged as a feasible solution to the Slepian-Wolf problem, particularly in scenarios with non-stationary sources and for data sequences with lengths ranging from small to medium. Due to the inherent decoding ambiguity in DAC, the number of candidate paths grows exponentially with the increase in source length. To select the correct decoding path from the set of candidates, DAC decoders utilize the Maximum A Posteriori (MAP) metric to rank the decoding sequences, outputting the path with the highest MAP metric as the decoding result of the decoder. However, this method may still inadvertently output incorrect paths that have a MAP metric higher than the correct decoding path, despite not being the correct decoding path. To address the issue, we propose Distributed Arithmetic Coding Aided by Linear Codes (DALC), which employs linear codes to constrain the decoding process, thereby eliminating some incorrect paths and preserving the correct one. During the encoding phase, DALC generates the parity bits of the linear code for encoding the source data. In the decoding phase, each path in the set of candidate paths is verified in descending order according to the MAP metric until a path that meets the verification criteria is encountered, which is then outputted as the decoding result. DALC enhances the decoding performance of DAC by excluding candidate paths that do not meet the constraints imposed by linear codes. Our experimental results demonstrate that DALC reduces the Bit Error Rate(BER), with especially improvements in skewed source data scenarios. Junwei Zhou HaoYun Xiao Jianwen Xi Qiuzhen Lin 7 pages, 7 figures